<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title type="text">OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com</title>
  <updated>2012-05-15T10:49:36+01:00</updated>
  <generator uri="http://framework.zend.com" version="1.12.20">Zend_Feed_Writer</generator>
  <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748"/>
  <link rel="self" type="application/atom+xml" href="https://www.augwessex.org.uk/discussions/view/748/feed"/>
  <id>https://www.augwessex.org.uk/discussions/view/748</id>
  <author>
    <name>AUGW</name>
    <email>info@augwessex.org.uk</email>
    <uri>https://www.augwessex.org.uk/</uri>
  </author>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-06T00:59:34+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3293"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3293</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">Some members may have come across excited news of this Java trojan, others may already have downloaded Apple's system patch posted on Wednesday 4th April.<xhtml:br/>
<xhtml:br/>
The first tell-tale is a modified padlock picture in a system authorisation dialogue. If you see an odd-looking padlock, don't authorise. Prior to Lion OSX installed Java by default, and these users should take note. <xhtml:br/>
<xhtml:br/>
If you are running Lion (and have not installed Java, or have always kept it switched "off" in Safari security prefs) there is little to worry about. Others may be interested in this article -- which looks intimidating but is simple enough when used to confirm that you DON'T have a problem. If you DO have a problem proceed with extra caution.<xhtml:br/>
<xhtml:br/>
&gt;  http://www.f-secure.com/v-descs/trojan-downloader_osx_flashback_i.shtml  &lt;<xhtml:br/>
<xhtml:br/>
Make sure you have read the whole article thoroughly, including "Additional Details" and then follow the instructions carefully, copying and pasting each Terminal command, checking the results and then moving to the next instruction indicated.<xhtml:br/>
<xhtml:br/>
Hopefully Apple will by now have used an automatic virus/trojan fix to your Mac for this malware.<xhtml:br/>
<xhtml:br/>
(Note that  if you want to look inside the Safari.app (and other app bundles) you need to control-click the Safari icon in Applications, and look for the menu item "See Package Contents").</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-07T10:26:17+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3294"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3294</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">CNET has posted a (slightly) more clear procedure (with a screen shot) for ridding infected Macs of the Flashback morph here:<xhtml:br/>
<xhtml:br/>
&gt;  http://reviews.cnet.com/8301-13727_7-57410096-263/how-to-remove-the-flashback-malware-from-os-x/?tag=mncol;txt  &lt;<xhtml:br/>
<xhtml:br/>
Happy Easter.</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-08T09:34:22+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3295"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3295</id>
    <author>
      <name>Eleanor Spenceley</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">There's a another good article on Flashback <xhtml:a href="http://www.macworld.com/article/1166254/what_you_need_to_know_about_the_flashback_trojan.html" target="blank">here</xhtml:a></xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-08T17:10:36+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3296"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3296</id>
    <author>
      <name>Thomas Maude</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">thanks Euan and Martin .....just reading now ....quick question .....in the preferences for both Safari and Firefox there is something call ' Javascript ' as well as 'Java' and a check box for both .......if I am going to turn off Java .....what about Javascript ? <xhtml:br/>
<xhtml:br/>
cheers <xhtml:br/>
Tom</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-09T09:49:33+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3297"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3297</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">It seems that the Flashback Trojan uses Java 'Applets', which in turn are Java Language programmes. Java 'Scripts' are embedded in web page HTML and carry out standard tasks such as collecting information on forms. Turning J-scripts off would be pretty limiting, whereas Java language is less immediately critical. <xhtml:br/>
<xhtml:br/>
See this discussion among others:<xhtml:br/>
<xhtml:a href="http://www.htmlgoodies.com/beyond/javascript/article.php/3470971/Java-vs-JavaScript.htm" target="blank">http://www.htmlgoodies.com/beyond/javascript/article.php/3470971/Java-vs-JavaScript.htm</xhtml:a><xhtml:br/>
<xhtml:br/>
"The main difference is that Java can stand on its own while JavaScript must (primarily) be placed inside an HTML document to function. Java is a much larger and more complicated language that creates "standalone" applications. A Java "applet" (so-called because it is a little application) is a fully contained program. JavaScript is text that is fed into a browser that can interpret it and then it is enacted by the browser--although today's web apps are starting to blur the line between traditional desktop applications and those which are created using the traditional web technologies: JavaScript, HTML and CSS."<xhtml:br/>
<xhtml:br/>
Apple's (double) system update should be a fix for the issue, so after making sure you don't have the Flashback trojan in your system (and getting rid of it if you have) make sure you have the system updates installed and keep an eye open for any further developments.</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-09T10:17:17+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3298"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3298</id>
    <author>
      <name>Eleanor Spenceley</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">Java and Javascripts are totally different languages/technologies and have nothing in common except the usage of Java in their name. <xhtml:br/>
<xhtml:br/>
Turning off Javascript is a bad idea since most web pages generally have some Javascript embedded in them so will make the webpage function 'weirdly'.<xhtml:br/>
<xhtml:br/>
Turning off Java is a good idea since very few websites use it these days and as we've seen is a security risk.</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-09T14:13:56+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3299"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3299</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">TUAW have posted a simple utility to check whether Flashback.1 is present:<xhtml:br/>
<xhtml:br/>
See Para 2 on this page "a simple utility". Click to download.<xhtml:br/>
<xhtml:br/>
<xhtml:a href="http://www.tuaw.com/2012/04/08/talkcast-tonight-10pm-et-fighting-flashback/" target="blank">http://www.tuaw.com/2012/04/08/talkcast-tonight-10pm-et-fighting-flashback/</xhtml:a></xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-09T14:42:23+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3300"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3300</id>
    <author>
      <name>Thomas Maude</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">are you sure it doesn't install it !! ( joke ) <xhtml:br/>
<xhtml:br/>
thanks for the link Euan <xhtml:br/>
<xhtml:br/>
Tom</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-09T14:51:03+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3301"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3301</id>
    <author>
      <name>Thomas Maude</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">Blistering Barnacles ! app works perfectly ..no virus found .........a thousand thanks for the link ....it's what numpty's like me need.....I had a go at the terminal command thing but couldn't do it. <xhtml:br/>
<xhtml:br/>
cheers <xhtml:br/>
<xhtml:br/>
Tom</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-13T00:16:43+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3307"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3307</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">There are now several Flashback.1 removal apps around, from f-secure, Kaspersky, etc. although the Kaspersly app has been temporarily withdrawn.<xhtml:br/>
<xhtml:br/>
Meantime Apple has posted (software update) a new version of Java which does the removal and offers better security. This is the third Java-related Apple update for Lion. Further details here:<xhtml:br/>
<xhtml:a href="http://www.tuaw.com/2012/04/12/java-for-os-x-2012-003-update-kills-flashback-malware-available/" target="blank">http://www.tuaw.com/2012/04/12/java-for-os-x-2012-003-update-kills-flashback-malware-available/</xhtml:a></xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-14T10:53:41+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3310"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3310</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">Although Java is not automatically installed with OS X Lion it seems that Flashback can affect it anyway. It may be a false assumption to think you are immune without Java.<xhtml:br/>
<xhtml:br/>
Apple have posted this tool to check for and remove Flashback code from Lion (non Java) systems:<xhtml:br/>
<xhtml:br/>
<xhtml:a href="http://support.apple.com/kb/DL1517" target="blank">http://support.apple.com/kb/DL1517</xhtml:a></xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-24T21:16:59+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3325"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3325</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">This morning the world woke to find a new variant of Flashback trojan: Flashback.S<xhtml:br/>
Credit: Intego anti-virus.<xhtml:br/>
<xhtml:br/>
Details here <xhtml:a href="http://www.computerworld.com/s/article/9226521/New_sneakier_Flashback_malware_infects_Macs" target="blank">http://www.computerworld.com/s/article/9226521/New_sneakier_Flashback_malware_infects_Macs</xhtml:a><xhtml:br/>
<xhtml:br/>
No formal fix yet, but if you have taken precautions already, hopefully it won't bring sudden death to your Mac.</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-04-28T10:36:36+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3332"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3332</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">Oracle are providing auto-updates for Java within OSX Lion from now on which should help malware resistance. See this article from ArsTechnica:<xhtml:br/>
<xhtml:br/>
<xhtml:a href="http://arstechnica.com/apple/news/2012/04/oracle-updates-java-to-se-7-for-os-x-brings-full-jdk-support.ars?comments=1#comments-bar" target="blank">http://arstechnica.com/apple/news/2012/04/oracle-updates-java-to-se-7-for-os-x-brings-full-jdk-support.ars?comments=1#comments-bar</xhtml:a></xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-05-01T17:15:39+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3338"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3338</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">Oh dear oh dear. Yet another Java villain has arrived, this time it uses Python scripts:<xhtml:br/>
<xhtml:br/>
    <xhtml:a href="http://nakedsecurity.sophos.com/2012/04/27/python-malware-mac/" target="blank">http://nakedsecurity.sophos.com/2012/04/27/python-malware-mac/</xhtml:a><xhtml:br/>
<xhtml:br/>
If you have used your browser preferences to "stop" Java -- NB "JavaScript" is something quite different and is fine to use -- and have installed all the latest Apple updates there should be no problem. But note that Apple have NOT issued updates to close off these attacks in OSX versions earlier than 10.6 Snow Leopard.<xhtml:br/>
<xhtml:br/>
The Sophos page offers a simple, quick check to see if you have been compromised, and also free anti-virus software from Sophos for home users:<xhtml:br/>
<xhtml:br/>
    <xhtml:a href="http://www.sophos.com/en-us/products/free-tools/sophos-antivirus-for-mac-home-edition.aspx" target="blank">http://www.sophos.com/en-us/products/free-tools/sophos-antivirus-for-mac-home-edition.aspx</xhtml:a><xhtml:br/>
<xhtml:br/>
ClamXav is another free (open source) antivirus protector if you prefer to use that:<xhtml:br/>
<xhtml:br/>
    <xhtml:a href="http://www.clamxav.com/download.php" target="blank">http://www.clamxav.com/download.php</xhtml:a><xhtml:br/>
<xhtml:br/>
The two AV software suites have been reviewed widely (see Google).</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-05-06T14:52:17+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3353"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3353</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">Anyone visiting the Oracle Mac Java update page may still find that it is under maintenance. It seems Apple are about to post two Java updates to bring themselves into line with the Oracle updater cycle:<xhtml:br/>
<xhtml:br/>
<xhtml:a href="http://www.appleinsider.com/articles/12/05/05/apple_readies_final_in_house_java_updates_ahead_of_oracle_handoff.html" target="blank">http://www.appleinsider.com/articles/12/05/05/apple_readies_final_in_house_java_updates_ahead_of_oracle_handoff.html</xhtml:a><xhtml:br/>
<xhtml:br/>
"The updates, titled "Java for OS X 2012-004" and "Java for Mac OS X 10.6 Update 9," are to be the last Apple-tailored runtimes for OS X 10.6 and 10.7 before all Mac-centric Java development moves to Oracle."</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-05-07T09:23:25+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3354"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3354</id>
    <author>
      <name>Trevor Hewson</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">Euan, does that mean that we will no longer be able to rely on Software Update to alert us when Java updates are needed? I know we can always rely on you of course :)</xhtml:div>
    </content>
  </entry>
  <entry xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <title type="html"><![CDATA[Re: OSX/Flashback.I  (latest variant).  Check and removal instructions from F-Secure.com]]></title>
    <updated>2012-05-15T10:49:36+01:00</updated>
    <link rel="alternate" type="text/html" href="https://www.augwessex.org.uk/discussions/view/748#3361"/>
    <id>https://www.augwessex.org.uk/discussions/view/748#3361</id>
    <author>
      <name>Euan Williams</name>
      <email>info@augwessex.org.uk</email>
      <uri>https://www.augwessex.org.uk/</uri>
    </author>
    <content xmlns:xhtml="http://www.w3.org/1999/xhtml" type="xhtml">
      <xhtml:div xmlns:xhtml="http://www.w3.org/1999/xhtml">It seems so, which is a pity, but we may have to wait for Oracle to get things together. Many applications do auto-alerts for updates or check for them under a Help Menu item (Acrobat Reader, Onyx, etc.</xhtml:div>
    </content>
  </entry>
</feed>
